General
-
Target
f265ce3179f1c3c06473fdfee2b2e079ee208974b0e6eb54d4e5bf82fe74f587
-
Size
1.1MB
-
Sample
241110-b79l3sxble
-
MD5
8ea08fdf734adcc27ba09e851e216783
-
SHA1
2feceb7d423be022e65231fcd08d075d8f576165
-
SHA256
f265ce3179f1c3c06473fdfee2b2e079ee208974b0e6eb54d4e5bf82fe74f587
-
SHA512
b4f4f1d3c05445bb290ab214c539fade82b39f2d600c60e39acce8009eb12626c5d7e3094e753784c5d8b3ccfdbaae49cde8bc1f46521131cb0afcb821e201a2
-
SSDEEP
24576:kyHP8/IX1fwqwFkzNv0BvuOzMfWOG5XkCEE9Xg+:zHk/IX1fwqwFkxrOz0W3UCLg
Static task
static1
Behavioral task
behavioral1
Sample
f265ce3179f1c3c06473fdfee2b2e079ee208974b0e6eb54d4e5bf82fe74f587.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
doma
185.161.248.75:4132
-
auth_value
8be53af7f78567706928d0abef953ef4
Targets
-
-
Target
f265ce3179f1c3c06473fdfee2b2e079ee208974b0e6eb54d4e5bf82fe74f587
-
Size
1.1MB
-
MD5
8ea08fdf734adcc27ba09e851e216783
-
SHA1
2feceb7d423be022e65231fcd08d075d8f576165
-
SHA256
f265ce3179f1c3c06473fdfee2b2e079ee208974b0e6eb54d4e5bf82fe74f587
-
SHA512
b4f4f1d3c05445bb290ab214c539fade82b39f2d600c60e39acce8009eb12626c5d7e3094e753784c5d8b3ccfdbaae49cde8bc1f46521131cb0afcb821e201a2
-
SSDEEP
24576:kyHP8/IX1fwqwFkzNv0BvuOzMfWOG5XkCEE9Xg+:zHk/IX1fwqwFkxrOz0W3UCLg
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1